Standard Grade Computing Studies Unit 6 – Commercial Data Processing Name: . . . . . . . . . . . . . . . . . Class: . . . Bishopbriggs Academy Contents: CDP1 – Need for Commercial Data Processing What is commercial data Processing? Manual system of CDP Advantages of using a computer for CDP CDP 2 – Hardware and Software The hardware used for CDP Typical applications used in CDP CDP 3 – The Data Processing Cycle The three elements in the data processing cycle The difference between data and information CDP 4 – Data collection, preparation and input Data collection and preparation Common forms of data preparation Checking data for errors Mid-Unit Questions 3 3 4 5 7 7 9 11 11 12 14 14 14 17 20 CDP 5 – Data Processing, storage and output Interactive Processing Random (or direct) access Multi-user access Data output Making backups Sequential access CDP 6 – Social Implications Effects on business Job and career opportunities Computer crime CDP7 – Technical and Economic Implications E-commerce Costs The mass market CDP 8 – Security and Privacy Implications The need to keep data accurate and private Physical and software security measures The use of customer lists End of Unit Questions 21 21 21 22 22 23 23 25 25 26 27 30 30 32 33 35 35 35 36 38 2 Bishopbriggs Academy - Standard Grade Computing Studies CDP1 – Need for Commercial Data Processing In this chapter you will learn • What is Commercial Data Processing? • Manual system of CDP • Advantages of using a computer for CDP What is a Commercial Data Processing (CDP)? Commercial Data Processing is the large scale processing of data by organisations such are banks, insurance companies, the civil service, shops, etc. The tasks carried out will include: • • • • • • • • • • Cash withdrawals from a bank cash machine (ATM) Calculating and printing invoices Calculating and printing bank statements Calculating and printing customer receipts in supermarkets Processing Internet and mail orders Processing insurance renewals Dealing with direct debits from bank accounts Paying pensions Dealing with the company payroll Processing exam results These tasks all have three things in common • They involve simple calculations • They are repetitive • They have to be carried out a huge number of times. This makes them ideal to be carried out by a computer. Unit 6 – Commercial Data Processing 3 Manual system of CDP Before the introduction of computers and the Internet these tasks would have been carried out manually. That is by people! All information was recorded on paper records and stored in filing cabinets. These cabinets took up a huge amount of space. Thousands of people were employed to type up invoices, type reminder letters to clients to renew policies and calculate and count out workers pay. Bank balances were written by pen in ‘pass-books’. Pensions and benefits were counted out by hand and benefit books stamped as a record. Problems can occur when people have to deal with large amounts of information: • Dealing with these processes is very slow as all handwriting had to be neat and legible. People would often make errors. • Each letter and invoice had to be typed from the start each time. Mistakes meant letters and invoices would have to be retyped. • Sometimes a paper record would be put back in the wrong place and be ‘lost’ leading to delays. • If one person had removed a record then no-one else could see that record until it had been returned – only one person could use a record at one time. If a record could not be found then records were duplicated wasting more time and space. 4 Bishopbriggs Academy - Standard Grade Computing Studies Advantages of using a computer for CDP Millions of processes are carried out every day by large commercial organisations – most without error. Today, this is only possible by the use of very large, fast and powerful computers. The use of large fast computers allows: • vast amounts data to be accessed and processed at very high speed. For example: a thousand people can connect and use one computer at the same time without any loss in access or processing speed. • the simple calculations, which make up most of the processing, to be carried out at high speed. • repetitive tasks, such as calculating and printing invoices or bank statements to be carried out accurately and quickly. • huge amounts of data to be stored in a small space. • more than one person access to a file at the same time so there is no need to duplicate information. • information to be analysed to produce management reports such as financial information showing the profit or loss of a company. Sales information showing which items are selling best and which need to be put on special offer to get rid of them. Customer information showing contact details and records of their custom. Unit 6 – Commercial Data Processing 5 Homework / Written Exercise 1 1 What does CDP stand for? C____________ D_____ P____________ 2 Use these words to complete the following sentences: processing fast access data small calculations paper banks many powerful calculations shared repeated person manual filing cabinets slow a) CDP is the large scale ___________ of ______ by organisations such as _____, shops, etc. b) CDP involves simple ___________, which are _________ frequently. c) In a ________ system all information is recorded on ________ and stored in ________ ________. d) Manual data processing is ______. e) In a manual system only one _______ can access the data at a time. f) CDP needs a very ____ and _________ computer. g) This computer is ________ between many people. h) Huge amounts of data can be stored in a _____ space. i) In a computerised system, ____ people can _______ the same data at the same time. 3 Describe how each of the following helps a company: (Credit) i) ii) iii) 6 Financial information Sales information Customer Information Bishopbriggs Academy - Standard Grade Computing Studies CDP2 – Hardware and software In this chapter you will learn • what hardware is used for CDP • the typical applications used in CDP The hardware used for CDP Desktop computers are not nearly fast enough or powerful enough to cope with the vast amount of data used by large companies’ commercial data processing. Large commercial companies all use mainframe computers to process their data. Mainframe computers are designed to be able to take input from many operators (possibly thousands) at the same time. This huge amount of data being fed into them also means that they must be able to store, access and output data much more quickly than any desktop computer. A typical commercial set-up is shown below: Magnetic Tape Units Hard Disc Units Terminals Central Processing Unit Unit 6 – Commercial Data Processing High Speed Printer Terminals 7 The main parts of a Mainframe Computer 1 The Central Processing Unit The processor is capable of carrying out 1000’s of millions of operations every second. Fast enough to allow 1000’s of operators to use it at the same time. It is usually fitted with several gigabytes of memory. (1 gigabyte = 1,000,000,000 bytes) 2 Hard Disc Unit A backing store capable of holding several terabytes with very fast random access. (1 terabyte = 1,000,000,000,000 bytes) The hard discs may be fixed or be able to be removed. A Mainframe System will have several of these connected to it. 3 Magnetic Tape Unit A backing store capable of holding several terabytes for sequential access (in order). The tapes are always able to be removed. A Mainframe System will also have several of these connected to it. Note: The Hard Disc Unit and the Magnetic Tape Unit have the same capacity - they differ only in how the data is accessed. 8 Bishopbriggs Academy - Standard Grade Computing Studies 4 Terminal A combination of keyboard and Visual Display Unit. Note: this has no processing power, memory or backing store of its own. All processing is completed in the Central Processing Unit. It is a simple input/output device. A Mainframe System may have hundreds or even thousands of these connected to it. 5 High Speed Printer An output device capable of printing 100’s of pages every minute. Often, these are High Speed Laser Printers. Typical applications used in CDP The most common software applications used in CDP are • • • • • • Stock control Payroll Accounting Order processing Application form processing Customer contacts Most of these applications depend on using a database. These databases may be made up of several connected files. Each file may have millions of records. Each record may have hundreds of fields to hold all of the data. An advantage of using connected files is that data only needs to be entered once, but then used many times by the connections to the other files. Unit 6 – Commercial Data Processing 9 Homework / Written Exercise 2 1 Complete the following sentences using these words: fields terminals input output speed hard applications unit records central tape mainframe high keyboard drives hard processor screen memory backing disc connected a) Large companies use __________ computers to process their data. b) These large computers are designed to take _____ from many users at the same time. c) A typical computer system will be made up of: d) i) T_________ ii) H _____ _______ printers iii) T____ drives iv) H______ ______ _____ v) C_________ Processor U_____ A terminal is a simple input and ______ device made up of a ________ and a _______. It has no _________, ________ or _____ store. e) Most ___________ in CDP are based on a database. f) The database is made up of _________ files made up of many ________ each containing many ____. 2 10 Why are ‘connected’ files used in the database? (Credit) Bishopbriggs Academy - Standard Grade Computing Studies CDP3 – The Data Processing Cycle In this chapter you will learn: • The three elements which make up the data processing cycle. • The difference between data and information The data processing cycle CDP software deals with the data in the following order: Collection; Preparation; Input; Process; Storage and Output. This is known as the Data Processing Cycle. In most CDP applications the software deals with each of these in turn. Once it has finished with the output it returns to the collection stage to repeat the cycle endlessly. Data Collection Data INPUT Preparation DATA Data Output OUTPUT DATA Data Input Data Storage PROCESS DATA Data Processing None of the processes require long complex calculations so each input can be processed and sent to the output quickly so the cycle can be completed at high speed allowing the huge amount of data to be processed quickly by a large number of users. Unit 6 – Commercial Data Processing 11 The difference between data and information. Humans deal with information. If you were told that a wall was 2 metres high, you would know that that is much higher than 2 centimetres. This is because our brains can make sense of the statement – it contains information that means something to us. Computers deal with data. A computer has no idea what a metre or a centimetre is. Data has no meaning. Computers work best with numbers. To make it easy for computer programs to work with data, we usually turn information into data in the form of numbers. For example: Information Data Tin of soup Holiday to Majorca Herald newspaper Lord of the Rings DVD SQA Exam number 5 1/2 miles 000157062802 72463129 9770965943612 5017239191695 04203512386 5.5 Even music is reduced to a very long series of numbers as a MP3 file, or a DVD video as an even longer series of numbers in a MPEG2 file to store and process them in a computer. We depend on the programs to turn this data back into information for us to understand and use. 12 Bishopbriggs Academy - Standard Grade Computing Studies Homework / Written Exercise 3 1 Complete the following diagram of the Data Processing Cycle. Data __________ Data __________ Data __________ Data _________ Data _________ Data _________ 2 What is the difference between information and data? 3 How is data represented inside a computer’s memory? Unit 6 – Commercial Data Processing 13 CDP4 – Data collection, preparation and input In this chapter you will learn about • Data collection and preparation • The most common forms of data preparation • Checking that the data has been entered correctly Data collection and preparation Humans make mistakes. When a thousand people are typing data into a computer using keyboards there will be lots of mistakes. In business these mistakes cost money to correct. Where ordinary members of the public have to supply information for the computers (data collection), this information is usually turned into data in advance for them (data preparation), otherwise there is a very good chance that errors will be made when the data is input to the computer. These data preparations must be simple, reliable and accurate. Most do not depend on humans to enter the data by hand, instead some sort of ‘reader’ is used. Six common forms of data preparation 1 Bar Codes A series of black and white lines which can be read by a scanner and turned into a 13 digit number. Almost all goods in our shops are marked with a bar code to identify them. 14 Bishopbriggs Academy - Standard Grade Computing Studies The first two digits are the country, the next five the company that makes the item, the next five represent the item itself and the last digit is a ‘check digit’. The check digit makes sure the data has been scanned correctly. 2 Magnetic Stripe AUTHORISED SIGNATURE If found, please hand this card into the nearest bank or Police Station Plastic credit and cash cards have a stripe of magnetic tape, similar to video tape, stuck to the back of the card. This holds the bank, branch and the account number of the owner. It does not hold the person’s name or their Personal Identification Number (PIN) which is need to withdraw money or how much money is in their account. Magnetic Stripe Cards are now easy to forge. 3 Optical Mark Recognition (mark sense) National Lottery Entry Ticket Use a dark pen or pencil to completely blacken out six (6) numbers and hand to the seller for entry into the terminal. [ 0] [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] Lottery tickets, and Pools coupons depend on the user marking the entry form with dark marks which block out numbers printed on the form. These marks are then read by a machine. This gives a very fast and reliable method of entering simple data into the computer. Unit 6 – Commercial Data Processing 15 4 Magnetic Ink Character Recognition (MICR) ,19 63-41-53 Bishopbriggs High School Savings Bank Pay or order £ A. N. Other "781249" 63"'4153": 63892742" 21 The line of numbers at the bottom of a bank cheque is printed in special magnetic ink. This can be read by a machine with great accuracy and also by humans. The operator only has to enter the value of the cheque. The bank sort code, the account number and the cheque number are read by the machine. 5 Smart Card This is replacing magnetic stripe cards for credit cards and bank cards. These have a tiny computer (or ‘chip’) embedded in the card which contains the same data as the magnetic strip, but they are much more difficult to forge. When used to buy goods, instead of the user signing the receipt, they enter a four digit pin – hence the term ‘Chip and pin’. These may eventually be used as a national identification card which would hold a vast amount of information about you including your finger prints, details of your iris, your face and your medial record. They might be used as driving licences and passports. 16 Bishopbriggs Academy - Standard Grade Computing Studies 6 Optical Character Recognition (OCR) Most plain text fonts can be read easily by a machine. ‘Styled’ text, such as italic or underlined, can be read by machine but there is a greater chance of mistakes being made. Optical Character Recognition is used by the Royal Mail to read typed post codes on letters and parcels and route them automatically to their destination. All of these 6 methods of data preparation have these features in common: • They can be read directly into a computer by a scanner • They can be read at high speed • They can be read without error Checking the data for errors Using these preparations means that data can be entered accurately at very high speed into a mainframe computer system. They eliminate most of errors caused by humans entering manually typed data. The use of further simple checks on data can detect errors, especially for data that has to be typed in manually. Verification Verification ensures that data has been entered correctly. When you change your password on a computer system, you will be asked to enter it twice. The new password is only recognised if both match. This is called double entry verification. Unit 6 – Commercial Data Processing 17 Validation Validation ensures that data makes sense. Common validation checks are: Range check Is the number entered within a certain range? For example: a month must be in the range 1 to 12, any other numbers would be outside of the range and indicate an error. Length check Have the correct number of characters been entered? For example: credit card numbers must be made up of 16 digits – any more or less would be an error. Check digit This is calculated from the series of numbers and added on to the end. For example: this is added to all barcodes. If the lines in the bar code become damaged then when the check digit is calculated it will not match the one on the end indicating an error in reading the barcode. It also produces an error if the barcode is scanned upside down – so the program will reverse the code and try again – this allows bar codes to be read upside down as well as right side up. 18 Bishopbriggs Academy - Standard Grade Computing Studies Homework / Written Exercise 4 1 Complete the following sentences using these words: sense bar stripe code mark magnetic a) The pattern of black and white lines found on most supermarket goods is known as a ____ _____. b) To use a bank cash machines you need a _________ _______ card. c) Entries to the National Lottery are made on _______ _______ cards. 2 Give 3 reasons why banks use Magnetic Ink Character Recognition to read their cheques? 3 Describe 3 ways of checking data for errors. 4 i) ii) Describe a ‘Smart Card’. (Credit) List 3 uses for a smart card. 5 i) ii) Describe ‘Optical Character Recognition’. (Credit) List 3 uses for OCR. 6 i) ii) Describe ‘verification’. (Credit) Why are passwords verified using double entry? 7 i) ii) Describe ‘validation’. (Credit) Why is it important to make sure that data is valid before it is processed? Unit 6 – Commercial Data Processing 19 Mid-Unit Questions 1 Briggs Super Stores are opening a new store. a) Use some of these words to complete the following sentences: customers calculating Smart speed databases volume range Magnetic repetitive terminals mainframe MICR management wages data stock i) The store will use a _________ computer to carry out the tasks such as _________ customer’s bills, keeping control of the ______, calculating employee’s _____ and keeping in touch with its __________. ii) Most of these tasks are simple, __________ calculations carried out on a huge ________ of data at high ______. iii) The Point of Sale _______ will have to be able to deal with Bar Codes, ________ Stripe Cards, ______ Cards and Cheques as well as cash. iv) Most of the CDP software depends on using _______. b) In a Bar Code, which digit is the check digit and what is its purpose? c) What other check would be performed on a bar code? 2 A range check can be performed on the month part of a date – would this be verification or validation? What check would be performed? (Credit) 3 Why does the store prefer their customers to use ‘smart cards’ to pay for their goods instead of magnetic stripe cards? (Credit) 20 Bishopbriggs Academy - Standard Grade Computing Studies CDP5 – Data processing, storage and Output In this chapter you will learn about • • • • • • Interactive processing Random (or direct) access Multi-user access Making backups Sequential access Data output Interactive processing With Interactive Processing the computer updates its data files immediately after an input is made For example: When you buy items in a supermarket, as each item is scanned, its cost is added to your bill and the number of that item kept in the stock file is reduced by 1. When this happens we say that the files have been updated. Updated The data held in files is changed to keep the files accurate and up-to-date. Interactive processing is only possible if the files are stored on Hard Disk media. This is because hard disk drives allow fast, random (or direct) access to the stored data. Random (or Direct) Access means data can be loaded and stored in any order from any area in the storage media. Unit 6 – Commercial Data Processing 21 Fast random access by hard disk drives gives one more advantage, it allows many users to access the data held on the disks. Multi-user Access allows many people to use the same data files at the same time. Output After processing data may be output in three different ways: To Screen The results of the processing are displayed on a computer screen. This is the most common form of output. However this does not create a permanent record of the output. To Paper The results of the processing are printed out on paper. We are being encouraged to use screen output to check our bank balances, telephone bills, power bills, etc because this saves paper and is environmentally friendly and it saves the companies money on materials and postage – but important information must be printed to create a permanent record. To File The results of processing are saved to another data file. This is used when the saved data will be reused. For example: Companies calculate their payrolls and save the results to a data file (usually on magnetic tape media). This data file is given to their bank where it is used as an input to transfer what each employee has earned from the company’s bank account to each employee’s bank account. 22 Bishopbriggs Academy - Standard Grade Computing Studies Backup All data users must make sure that their data is protected. All commercial users make sure that they ‘backup’ their data on a regular basis. Making a regular sequence of backup copies is called File Ancestry. These backup copies are always kept in a safe location away from the original data. It is usual to make backup copies onto Magnetic Tape media. Magnetic tape drives have sequential access. This makes them unsuitable for interactive processing, but ideal for holding backup copies of data files. Sequential Access means that the data must be read back in the same order as it was written. i.e. item 1, item 2, item 3, etc. Unit 6 – Commercial Data Processing 23 Homework / Written Exercise 5 1 Complete the following sentences using these words: screen update paper changed file up-to-date accurate backup safe copy a) An _______ is when a file is ________ to keep its data ________ and ________. b) A ________ is a ______ of a file which is kept in a ______ place away from the original _____. c) The most common form of output is to the ______. d) If you want a permanent record then information must output to _______. 2 Describe what is meant by ‘Interactive Processing’. (Credit) 3 What type of media is used with Interactive Processing. 4 Describe what is meant by ‘random (or direct) access’ to data. 5 What other benefit does random access have when magnetic hard disc drives are used to access their media? 6 What type of media is usually used to make backups? 7 Describe how sequential access is used to store the data on a Magnetic Tape media during a backup. 8 Describe a circumstance when output is made to a file 24 Bishopbriggs Academy - Standard Grade Computing Studies CDP6 – Social Implications In this chapter you will learn about • Effects on business • Job and career opportunities • Computer crime Effects on business The aim of every business is to make a profit. Computers help companies make larger profits because: • Orders can be processed faster than manually • It is easy to keep large numbers of customers in touch with the company, keeping them up-to-date with new items and offering sales promotions to generate new business. • Enquiries can be dealt with quickly and effectively if all the relevant information can be displayed on a screen by the person dealing with the enquiry. Companies that offer their customers good service tend to get repeat business and be recommended to others generating more business. Unit 6 – Commercial Data Processing 25 Jobs and Career Opportunities The introduction of computers has meant that companies must now employ new staff trained to deal with them. Systems Analyst The Systems analyst is in charge of the computer software. The analyst decides what new software is needed or when existing software needs updated. The analyst will design the new software and any changes that have to made to existing software. The analyst must then test the new software to ensure it works correctly before the company puts it into use. The analyst is in charge of the programmers. Programmers The programmers turn the designs for new software into code for the analyst. Engineer The engineer is in charge of the computer hardware, recommending new hardware and maintaining existing hardware and repairing it when it breaks down. Network Manager The network manager is responsible for keeping the flow of data to and from the work stations to the mainframe computer as trouble free as possible. The network manager controls the access to the network by means of setting the user IDs, passwords and the access privileges of each user on the network (what data files they can open, what programs they can run, what Internet access they will have and their printer usage). 26 Bishopbriggs Academy - Standard Grade Computing Studies Computer Crime Unfortunately, the use of computers has created a whole series of new crimes. Some examples you may have heard about are: • Fake web sites advertising offers that are ‘too good to be true’. These accept payments and then do not deliver any goods in return. Once the criminals have made enough money they and their web site ‘disappear’. Only buy from reputable companies! • Identity theft: Criminals steal details of credit card numbers (and whole identities of people) and then use these to make purchases for themselves in that person’s name leaving the victim to pay. Shred credit card and bank statements when you are finished with them. • Credit card cloning: The details on credit or debit card can be copied and them many duplicate cards made. These are distributed around the world and used to make purchases. Change to a ‘Chip and Pin’ card that is harder to copy. • Premium line rerouting: unprotected PCs are vulnerable to having to a small program loaded from the Internet which the next time the user connects to the Internet with a modem, instead of going to their usual Internet Service Provider, they are redirected to a different one, often in an other country, which charges premium rates (£1.50 per minute!) for the telephone connection. The user will know nothing about this until they receive their telephone bill (up to 3 months later!) Doesn’t work with ‘broadband’. Unit 6 – Commercial Data Processing 27 • Denial of Service attacks: Companies which depend on the Internet for their business are blackmailed into paying money to criminals or their web site will receive so much traffic that it will shut down preventing the company from trading. Large companies can use special security systems to prevent this – but only large companies can afford them! • Writing or releasing malicious computer programs: ‘Viruses’, ‘Worms’, ‘Trojan horses’ and ‘Spyware’ can severely disable a computer system or slow the Internet down to a slow crawl as they spread. Keep the security software on your computer up-todate and active. • Hacking: Accessing someone else’s computer files without permission. This is committed either to read their files to steal information, change the contents in their favour or to delete files to make problems for the victim. A good active firewall can prevent this. Computer criminals can be very hard to catch. • The criminals do not need to be at the scene of the crime – so they leave no forensic evidence. • Crimes can be carried out from a different country that has poor control over Internet access making them hard to trace. • Crimes may not be noticed for several months – by which time the criminals are long gone. • Many victims can be targeted at once, using ‘zombie’ PCs which have been ‘taken over’ by the criminals – The owners probably will not know that their PC is being used. 28 Bishopbriggs Academy - Standard Grade Computing Studies Homework / Written Exercise 6 1 Complete the following sentences using these words: Enquiries quickly customers orders new a) CDP will help a business increase it profits because _______ can be processed ________. b) It is easy to keep in touch with a large number of _________ telling them of special offers and new products to generate ____ business. c) _________ can be dealt with quickly. 2 What is the job of the following people? i) Network Manager ii) Systems Analyst iii) Engineer iv) Programmer (Credit) 3 Which law makes ‘hacking’ and writing and releasing malicious software illegal? 4 Describe 4 other common computer crimes and state a precaution to be taken for each of them. Unit 6 – Commercial Data Processing 29 CDP 7 – Technical and Economic Implications In this unit you will learn about: • E-commerce • Costs • Dealing with a mass market. E-commerce E-commerce is the ability to buy and sell goods electronically using the Internet. • Companies such as eBay let anyone buy and sell goods over the Internet. Goods are posted with a recommended price and people bid for them over a set period of time – whoever offers the highest price buys the item. • All of the large superstores offer Online Shopping where the customers can browse their goods on the company’s web site, choose their goods and have them delivered directly to their home. Internet buyers are often offered special discounts. • All of the large banks offer Online Banking. Clients can check their bank statements, pay bills, transfer money from one account to another and arrange loans through a secure Internet connection. Some banks only operate online – they have no branches so their costs are lower – so they can offer higher rates of interest then the ‘high street banks’. All of this is only possible because of Electronic Funds Transfer. 30 Bishopbriggs Academy - Standard Grade Computing Studies Electronic Funds Transfer allows bills to be paid by the computers without any real money changing hands. Most bank customers arrange for their regular bills such as telephone, gas, electricity, insurance, TV licence and council tax to be paid automatically at set times each month. Provided there is enough money in the bank account each bill is deducted from the account and added to the company’s account to pay the bills. Modern Internet banking allows anyone to set up an Internet account with their bank and pay most of their bills this way as well as transferring money between different accounts. This can be carried out from anywhere in the world provided they have Internet access. Debit Cards let us take this one stage further. Most large shops use Point of Sale terminals instead of cash registers today. The Point of Sale (POS) terminals are shop ‘check-outs’ which are connected directly to the shop’s mainframe computer and also to the bank secure network. When a debit card is used to pay, it is first checked it is not stolen or out of date and the correct ‘pin’ is entered. Then the shop’s mainframe computer contacts the customer’s bank to check if there is enough money in their account. If there is, then the cost of the goods is deducted from the customer’s bank account and added to shop’s bank account. This is sometimes known as EFTPOS (Electronic Funds Transfer at Point of Sale). In addition, because this is a computer terminal, each of the goods bought is subtracted from the stock file in the shop, so the shop ‘knows’ exactly what is in stock at any one time and can order replacements before the stock runs out. It will also update its financial file. Unit 6 – Commercial Data Processing 31 Economic Implications Setting up an E-commerce company is expensive. A large company has to: • Buy the hardware (computers, point of sale terminals, printers, networking, printers, terminals, etc) • Buy the software (web servers, web design software, stock control, financial control software, etc) • Lease a very fast Internet connection (many times faster than household ‘broadband’. • Employ specialist Web Designers to create the online site. • Employ Engineers to set up the hardware • Employ Network Managers to control the network • Employ Systems Analysts to design the software so it all works seamlessly together • Employ Programmers to write the code for the software. • Arrange for delivery of the goods. 32 Bishopbriggs Academy - Standard Grade Computing Studies Once set up there are running costs: • Maintenance of the hardware • Paying for consumables (printers need ink or toner and paper, magnetic tapes for making backups.) • Paying the Web designers to keep the site up-to-date and ‘fresh’. • Continuing to lease the Internet connection. • Paying the staff (Network Manager, Systems Analyst, Programmer and Engineers) to maintain the systems. • Upgrading the hardware and software as technology improves or the company wishes to add new services. • Delivering the goods to their customers. Large companies like E-commerce because it gives them access to a much bigger market (the mass market) and generate more sales and more profit. Small companies can also take advantage of E-commerce. One person can set up a business from home, working with a simple desktop computer using ready-made E-commerce software and leasing a business broadband connection for not much more that the normal household connection. These one-person companies tend to offer specialist services such as web-site design (They receive their contracts over the ‘net, produce the site and deliver it back to their clients over the ‘net.) Others might make specialist goods like fishing flies, which are made to order in very small numbers and then posted to the clients all round the world. E-commerce lets both large and small companies get access to the mass market boosting their sales. Unit 6 – Commercial Data Processing 33 Homework / Written Exercise 7 1 Complete the following sentences using these words: mass E-commerce market online network banking hardware Internet engineer systems analyst programmers manager deliver shopping a) ____________ is the ability to buy an sell goods electronically over the Internet. b) _______ ___________ lets customers choose goods on a web page and have them delivered to their home. c) Online ________ lets customers pay their bills and move money from account to account over the Internet. d) To set up online shopping, a large company must first buy the ________, lease a fast _______ connection, hire __________, ________ _________, __________ and a ________ ________. Finally they must make provision to ________ the goods. e) E-commerce gives large and small companies access to the _____ _______. 2 What is meant by ‘Electronic Funds Transfer (EFT)’? 3 How is EFT carried out in large shops? 4 List 3 running costs of maintaining an E-commerce business. 34 Bishopbriggs Academy - Standard Grade Computing Studies CDP 8 – Security and Privacy Implications In this unit you will learn about: • The need to keep data accurate and private • Physical and software security measures • The use of customer lists Data Protection Act, 1998 The Data Protection Act, 1998, sets out how the use of information about people can be used. You studied this in unit 3 (Introduction to General Purpose Packages), so it is summarised here. Companies and organisations keeping personal data must ensure that the data they keep is accurate and private. • Companies and organisations will regularly ask to confirm information is correct. • Any individual has the right to see and check information held about them. If they can prove the information is incorrect then the company or organisation must correct their records. • Information can only be accessed by the people who need to work with the information. • Information can only be used for the purpose for which it was originally collected. In addition the organisations or companies must keep the data secure. • All data is backed up regularly and the backups kept in a secure location away from the originals. • Antivirus software is active and kept up-to-date Unit 6 – Commercial Data Processing 35 • The computers are kept in locked areas so only authorised people can use them. • Each computer has a physical lock so only the key holders can use it. • User IDs and passwords are needed to access files. • Data can be encrypted to make it unreadable. • An active firewall is used to prevent access through the Internet. Customer Lists Every company keeps list of all of its customers. It will send advertising directly to them to inform them of new products or special offers and perhaps generate more business. Customers giving personal details for the first time must be informed what their information will be used for. For Example: The company could make money by selling its customer list to other companies. However, before they can do this, the customers must have given their permission for their details to be passed on. This is usually in a statement in the ‘small print’ stating that if you do not tick the box opposite you give the company permission to sell this information. The ‘small print’ can be very small, but not so small that a person with normal eyesight cannot read it without the help of a magnifying glass! Companies that have bought customer lists may not contact people on the list by, mail, telephone, fax or e-mail if that person has signed up to a ‘preference service’. 36 Bishopbriggs Academy - Standard Grade Computing Studies Homework / Written Exercise 8 1 Complete the following sentences using these words: people collected see private prove purpose confirm corrected a) A company can ensure the data it holds about _______ is accurate by asking customers to _________ their details from time to time. b) An individual has the right to ____ any information held about them and have it ___________ if they _____ it is wrong. c) A company will keep information ________ by only allowing certain people access to files. d) Companies can only use information about people for the ________ the data was _______. 2 Which Act governs the use of ‘personal information’ ? 3 Describe 4 ways a company can keep personal data secure. 4 What 3 benefits are there for a company to keep a list of its customers? 5 Why is it important to read the ‘small print’? 6 What is the benefit to a company of buying a customer list? 7 How can individuals reduce the amount of junk mail, faxes, e-mails and telephone sales calls? Unit 6 – Commercial Data Processing 37 End of Unit Questions 1 Use some of these words to complete these sentences: Internet mass online safe market shopping screen updated backup regular permanent paper help tutorial ticket a) A series of _______ copies should be made on a ________ basis and kept in a ____ place. b) When a change is made to file it said to be ________. c) Output to ______ is used more than output to _____, but the paper copy gives a __________ record. d) Online _______ and ______ banking are examples of E-commerce. e) E-commerce helps small companies reach a much bigger ____ market. f) Initial costs can be quite low for a small company using E-commerce, just needing a computer, software and an ________ connection. 2 Why is ‘interactive processing’ used at point of sale terminals? 3 What jobs would be created to use CDP in a large store? 4 Apart from random access, what other benefit does using a hard disk drive bring to interactive processing? (Credit) 5 a) How is the output from the store’s payroll program prepared for delivery to a bank? (Credit) b) Why does the bank prefer its data this way? (Credit) 38 Bishopbriggs Academy - Standard Grade Computing Studies
© Copyright 2026 Paperzz